Professional Documents
Culture Documents
B.C.A. PART-III EXAM, 2008: References
B.C.A. PART-III EXAM, 2008: References
1. Hearn & Baker: Computer Graphics (2nd Ed.). Prentice Hall India.
2. Krihsnamurthy N: Introduction to computer Graphics, Tata Mc Graw Hill Edition.
3. Zhigang X. & Plastock R.a. : Theory and problems of Computer Graphics (Schaum's
Outline), Tata Mc Graw Hill.
4. Gonzalez & gonzalez, Digital Image Processing, Pearson Education.
5. Jain V.K. Fundamentals of Digital Image processing, Pearson Education.
Introduction to system and Basic System Concepts, Types of Systems, The Systems Approach,
Information System: Definition & Characteristics, Types of informaiton, Role of Information in
Decision-Making, Sub-Systems of an Information system : EDP and MIS managment levels,
EDP/MIS/DSS.
An overview of Management Information System: Defination & Characteristics, Components of
MIS, Frame Work for Understnding MIS : Information requirements & Levles of Management,
Simon's Model of decision-Making, Structured Vs Un-structured decisiohs, Formal Vs. Informal
systems.
Developing Information Systems: Analysis & Desion of Information Systems: Implementation &
Evaluation, Pitfalls in MIS Development.
Functional MIS : A Study of Marketing, Personnel, Financial and production MIS.
References :
Introduction : Goals and settings, The symmetic setting, The asymmetric setting. Other goals
Pseudorandom Number Generation, Authenticated key exchange, Coin flipping, What
cryptography is about, Protocols, parties and adversaries, Cryptanaly and computer secutity the
rules of the game, Approaches to the study of cryptography, Phases in the cryptography's
Development, Cryptanalysis-driven design, Shannon security ofr symmetic encryption,
Computer tational complexity theory, Atomic primitives, what background do I need? ,
Historical notes, problems.
Block Ciphers : What is a block cipher? Data Encryption Standard (DES) Key recovery attacks
on block ciphers, Iterated DES and DESX, Advanced encryption Standard (AES), Limitaitions
of recovery key based security, Problems.
Pseudorandom Functions : Function families, Random functions and permutaions,
Pseudorandom Funcitons, Pseudorandom permutations, Modeling block ciphers, Example
attacks, Security against key recovery, The birthday attack, The PRP/PRF switching lemma.
Historical notes.
Symmetric Encryption :Some Symmetric Encryption schemes, Issues Iqn privacy,
Indistinguishability under chosen-plaintext attack, Example chosen-plaintext attacks, INF-CPA
implies PR-CPA, Security of CTR modes, Security of CBC with a ramdom IV, Historicla notes.
Hash Functions : The hash function SHAI, Colision resistant hash functions, Colliison, attacks.
One-way ness of colision resistant hash functions, Polynomial evalution is an almost universal
hash, function, The CBC MAC function, Collision-resistance under hidden-key attack.
Message Authentication : The setting, Privacy does not imply authenticity, Syntex of message-
authentication schemes a definitation of security for MACs , The PRF-as-a MAC paradigm, The
CBC MACs.
Number-Theoretic Primitives : Introduction to discrete algorithm ralated probelms, The choice
of group; The RSA system, Historical notes.
Asymmetic Encryption :
Asymmetic encryption schemes, Notions of security,one encryption query or many? Hybrid
encryption, El Gamal scheme and its variants.
Digital signatures : Digital signature schemes, A notion of security, RSA based signatures.
References :
1. Crytographic & N/W secuirty: Principles & Practices by Stalling, Prentice Hall.
2. Network Security Essentials: Applications & standards by Stalling, Pearson Education Asia,
2003.
Website Development using web authoring tools: Front Page, Visual Interdev, Flash and their
relative comarison.
Datail Studies of Server programming : ASP, JSP, PHP and relative comparison.
Paper 323 : Computer Architecture and Networking Lab. (Laboratory)